Risk Trends, Cloud-Based Security and Knowledge Sharing

August 1, 2019
Cloud, IT Security

IT security. IT risks. Security risks. Cloud-based security. Whatever keywords you enter into a search engine, you’re going to get back a lot of results. Security is one of the most popular issues — and biggest challenges — in the IT industry, as well in in business overall.

For all the search results returned, it seems few offer any new insights or concrete solutions for mitigating security risks. Some of that is because the authors behind the articles that appear in the search results are vendors. They sell IT security solutions, and don’t want to give too much away online.

Case studies, by vendors or cloud services providers, sometimes offer more information about particular ways to solve common security issues. But they tend to be vague. After all, there’s only so much detail you can include in a case study.

One of the ways we’ve found to be more effective in sharing information, whether it’s about IT security or another subject, is via webinars. The format and length of time can vary, but it gives us a chance to discuss real-world solutions and then open things up for questions.

Our recent “Security Risk Trends that Necessitate Cloud-Based Security” is a good example. The focus was on the trends we’re seeing in IT security risk trends, with a big one being the security vulnerabilities that arise from multi- and hybrid-cloud deployments. But the webinar wasn’t just about trends. It was about solutions. 

The Risks of Multi- and Hybrid Cloud Deployments

Before diving into the webinar overview, here’s some background on that multi- and hybrid-cloud deployment issue.

Many companies that have migrated to the cloud have discovered that not all workloads belong in the public cloud. Some perform better in a different environment. It’s part of a trend called “cloud repatriation.

In a 2018 IDC survey, 80% of the respondents said they moved cloud workloads on premise or to a private cloud solution within the past year. The survey also noted that respondents planned to migrate an additional 50% of their current public cloud workloads either on premise or to a private cloud within the next two years.

In addition, the analysts at Gartner say adoption rates and expenditures for Infrastructure as a Service (IaaS), platform as a Service (PaaS) and Software as a Service (SaaS) are increasing.

This all has implications for security. Dealing with different environments disrupts the traditional security perimeter. Applications and data must be able to move across a complex web of on-premises infrastructure and private clouds, as well as third-party delivered cloud resources. This substantially increases the number of potential security risks while expanding the attack surface.

Add in the need to achieve and maintain compliance with specific technical and security controls. Things get even more complicated.

Theory Meets Real-world Usage

Rather rather than focusing on single  “for sale” solution, our presenters for “Security Risk Trends that Necessitate Cloud-Based Security” cited some real-world examples of trending security risks and the why’s and how’s of various cloud-based security solutions US Signal has found effective.

Here are just a couple of highlights: 

  • DDoS mitigation? Try edge protection; always-on filtering via DNS – active; cloud-based scrubbing via border gateway protocol (BGP) – passive; web application firewall (WAF); and autonomous system number (ASN), country, IP and reputation firewall, and rate limiting.
  • General security practices? Protect and filter at the edge and leverage shared intelligence whenever you can. 

Another valuable component of most webinars is the question-and-answer session at the end. It’s the perfect time to get more detail about various points covered. You’ll see that happen in this webinar – and get more good information out of it.

Watch Now or Later

If you’d like to learn more about IT security, specifically solutions to IT security risks, take the time to watch “Security Risk Trends that Necessitate Cloud-Based Security.” You’ll find other informative webinars in the Resources section of this website too.

For more information about anything in the security risk webinar, don’t hesitate to contact our presenters. Their contact information is at the end of the webinar. Ready to discuss solutions to your company’s specific security risks? We’ve got you covered on that too. Call 866.2. SIGNAL or email us at [email protected].